Part Ii A Teacher S Reference Form Completed Application Due: March 15, 2012 Student: Fill & Download for Free

GET FORM

Download the form

How to Edit The Part Ii A Teacher S Reference Form Completed Application Due: March 15, 2012 Student conviniently Online

Start on editing, signing and sharing your Part Ii A Teacher S Reference Form Completed Application Due: March 15, 2012 Student online following these easy steps:

  • Push the Get Form or Get Form Now button on the current page to access the PDF editor.
  • Wait for a moment before the Part Ii A Teacher S Reference Form Completed Application Due: March 15, 2012 Student is loaded
  • Use the tools in the top toolbar to edit the file, and the added content will be saved automatically
  • Download your completed file.
Get Form

Download the form

The best-rated Tool to Edit and Sign the Part Ii A Teacher S Reference Form Completed Application Due: March 15, 2012 Student

Start editing a Part Ii A Teacher S Reference Form Completed Application Due: March 15, 2012 Student immediately

Get Form

Download the form

A quick direction on editing Part Ii A Teacher S Reference Form Completed Application Due: March 15, 2012 Student Online

It has become really easy recently to edit your PDF files online, and CocoDoc is the best PDF online editor you have ever seen to make a series of changes to your file and save it. Follow our simple tutorial to start trying!

  • Click the Get Form or Get Form Now button on the current page to start modifying your PDF
  • Add, change or delete your text using the editing tools on the toolbar above.
  • Affter altering your content, add the date and create a signature to bring it to a perfect comletion.
  • Go over it agian your form before you save and download it

How to add a signature on your Part Ii A Teacher S Reference Form Completed Application Due: March 15, 2012 Student

Though most people are adapted to signing paper documents by handwriting, electronic signatures are becoming more normal, follow these steps to finish the PDF sign!

  • Click the Get Form or Get Form Now button to begin editing on Part Ii A Teacher S Reference Form Completed Application Due: March 15, 2012 Student in CocoDoc PDF editor.
  • Click on the Sign tool in the tool box on the top
  • A window will pop up, click Add new signature button and you'll have three choices—Type, Draw, and Upload. Once you're done, click the Save button.
  • Drag, resize and settle the signature inside your PDF file

How to add a textbox on your Part Ii A Teacher S Reference Form Completed Application Due: March 15, 2012 Student

If you have the need to add a text box on your PDF for making your special content, take a few easy steps to get it done.

  • Open the PDF file in CocoDoc PDF editor.
  • Click Text Box on the top toolbar and move your mouse to position it wherever you want to put it.
  • Write in the text you need to insert. After you’ve typed the text, you can select it and click on the text editing tools to resize, color or bold the text.
  • When you're done, click OK to save it. If you’re not happy with the text, click on the trash can icon to delete it and start over.

A quick guide to Edit Your Part Ii A Teacher S Reference Form Completed Application Due: March 15, 2012 Student on G Suite

If you are looking about for a solution for PDF editing on G suite, CocoDoc PDF editor is a recommended tool that can be used directly from Google Drive to create or edit files.

  • Find CocoDoc PDF editor and establish the add-on for google drive.
  • Right-click on a PDF document in your Google Drive and click Open With.
  • Select CocoDoc PDF on the popup list to open your file with and allow access to your google account for CocoDoc.
  • Modify PDF documents, adding text, images, editing existing text, mark with highlight, erase, or blackout texts in CocoDoc PDF editor before saving and downloading it.

PDF Editor FAQ

What is ‘PROM’?

PromFrom Wikipedia, the free encyclopediaA typical gathering, with boys in tuxedos, and girls in dresses with corsages on their wrists.Decorating for prom, students and student advisers put finishing touches on a ballroom at a banquet hall.In the United States, and increasingly in the United Kingdom and Canada, a promenade dance, most commonly called a prom, is a semi-formal (black tie) dance or gathering of high school students. This event is typically held near the end of the senior year (the last year of high school). Proms figure greatly in popular culture and are major events among high school students. High school juniors attending the prom may call it "junior prom" while high-school seniors may call it "senior prom". In practice, this event may be a combined junior/senior dance.At a prom, a Prom King and Prom Queen may be revealed. These are honorary titles awarded to students elected in a school-wide vote prior to the prom, and seniors are usually awarded these titles.[1]Other students may be honored with inclusion in a "Prom Court." The selection method for a Prom Court is similar to that of HomecomingQueen/Princess, King, and Court. Inclusion in a Prom Court may be a reflection of popularity of those students elected and their level of participation in school activities, such as clubs or sports.[2][3]The Prom Queen and Prom King may be given crowns to wear. Members of the Prom Court may be given sashes to wear and photographed together.[4]Similar events take place in many other parts of the world. In Australia and New Zealand, the terms school formal, and ball are most commonly used for occasions equivalent to the American prom, and the event is usually held for students in senior years, although the bestowing of the regal titles rarely, if ever, occurs. Many schools hold a formal graduation ball for finishing students at the end of the year in place of or as well as a formal. In Ireland a debutante ball or Debs may also be held. In Poland high schools organize a "studniówka". The term "prom" is becoming more common in the UK and Canada because of the influence of American films and television shows.In the United StatesHistoryProm danceIn the early days of high school proms, the nighttime dance served a function similar to a debutante ball. Early proms were times of firsts: the first adult social event for teenagers; the first time taking the family car out after dark; the first real dress-up affair; and so forth. Proms also served as a heavily-documented occasion, similar to a milestone event such as first communion or a wedding, in which the participants were taking an important step into a new stage in their lives. In earlier days, the prom may have also served as an announcement of engagement for the “best couple” after the prom court had been crowned and recognized.While high school yearbooks did not start covering proms and including prom pictures until the 1930s and 1940s, historians, including Meghan Bretz, believe proms may have existed at colleges as early as the late 19th century. The journal of a male student at Amherst College in 1894 recounts an invitation and trip to an early prom at neighboring Smith College for women. The word prom at that time may just have been a fancy description for an ordinary junior or senior class dance, but prom soon took on larger-than-life meaning for high school students.Proms worked their way down incrementally from college gatherings to high school extravaganzas. In the early 20th century, prom was a simple tea dance where high school seniors wore their Sunday best. In the 1920s and 1930s, prom expanded into an annual class banquet where students wore party clothes and danced afterwards. According to Jackie Blount, during the McCarthy era "schools became implemented curricula intended to keep youth sexually straight. In effect, schools became fundamentally important agencies in the nationwide campaign to fight homosexuality." This attitude further promoted heteronormative practices such as naming a prom king and prom queen, requiring strict gender conformity in dress, etc.As Americans gained more money and leisure time in the 1950s, proms became more extravagant and elaborate, bearing similarity to today’s proms. The high school gym may have been an acceptable setting for sophomore dances (soph hop), but junior prom and senior balls gradually moved to hotel ballrooms and country clubs. Competition blossomed, as teens strove to have the best dress, the best mode of transportation, and the best looking date. Competition for the prom court also intensified, as the designation of “prom queen” became an important distinction of popularity. In a way, prom became the pinnacle event of a high school student’s life, the ultimate dress rehearsal for a wedding.Today, prom continues to be a notable event in the social climate of high schools. Popular movies and novels attest to the importance of prom themes, prom dates, and prom queens. In some areas, the traditions of prom are not as rigid as they used to be, with some areas allowing individuals or groups to attend instead of couples. In 1975 U.S. First Daughter Susan Ford held her prom in the East Roomof the White House.TerminologyUsage of the term “prom” is becoming more common and appears to be a colloquial and regional practice. Formal English usage suggests "Prom" is a noun and should be preceded by an article although it often is not in practice."Prom" is a shortened version of promenade.AttireGirl in formal prom attire, United States, 1950sBoys usually dress in black or white formal wear, regardless of the time of the event, sometimes paired with ties or bow ties with vests, in some cases in colors matching their date’s dress. Most are rented from stores that specialize in formal wear rentals.Girls wear traditional ladies' dresses or evening gowns and adorn themselves with ladies’ jewelry such as earrings and a necklace. Traditionally girls wear perfume, and make-up such as eyeshadow, lipstick and blush. Girls also wear a corsage, given to them by their dates, and girls give boys matching boutonnières to be worn on their lapels. Some couples want to match their dates dress color to their tie or suit. Some fashion houses within the industry have a special focus in the prom and evening wear sector.Logistics and traditionsGirl beside a limousine before PromProm attendees may be limited by their schools to be juniors or seniors and guests under age 21.Before prom, girls typically get their hair styled, often in groups as a social activity at a salon. Prom couples then gather at a park, garden, or their own and their dates’ houses for single and/or group photographs. Prom attendees may rent limousinesor party busesto transport groups of friends from their homes to the prom venue: a banquet hall or school gymnasium. Some schools host their proms at hotel ballrooms or other venues where weddings typically take place. The dance itself may have a band or DJ. At prom, a meal may be served. The cost of prom in the United States averaged $1078 per family in 2012 and $1139 in 2013.Some high schools allow only the graduating class (Seniors) to have a prom. Some schools also allow grade 11 (Juniors) to have a prom, and select high schools even have proms for Freshmen and Sophomores. In some cases there is a combined Junior/Senior prom. Some American high schools and colleges that do not allow school-sponsored dances will host a Junior/Senior prom as a banquet instead of a dance. Typically, students still dress in formal attire and attend as couples. More and more colleges are hosting proms in recent years, usually as fundraisers for campus organizations such as Ballroom Dance groups, fraternities/sororities, or other organizations. In recent years, American teens have started asking celebrities or famous models to their Proms.Post PromAfter the prom, parents or a community may host a “prom after-party” or “afterglow” or “post-prom” at a restaurant, entertainment venue, or a student’s home. Other traditions often include trips to nearby attractions, such as amusement parks, regional or local parks, or family or rented vacation houses. Some of these post-prom events are chaperoned and some are unsupervised. Many Post Proms (After Prom Events) are at the school, and involve bringing entertainment such as interactive games, artists, and other entertainers to the school.In the United KingdomStudents and their parents in the prom night, EnglandIn the United Kingdom prior to the 2000s, many secondary schools held a "Summer Ball" to celebrate the end of term, and/or "Leavers Ball" to celebrate the end of schooling, but usually this did not have the cultural or social significance of the US-style Prom. From the 1970s there had also been a tradition of "School Discos", which were semi-formal events held at various times of the year, in particular during the Christmas period, though not all secondary schools would allow such events or "do's".During the 2000s, school "Proms" have become common at UK schools, apparently due to the influence of US TV showsThe Daily Telegraphreported in 2012 that:“elaborate 'passing out' celebrations for Year 11 students (aged 15–16) and Year 13 (aged 17–18) have become a cultural phenomenon, stoking passions and rivalries, and refashioning the sense of what a school party should be. More than 85 per cent of schools in Britain hold school Proms, which range from no-frills dinners in school halls to tailor-made extravaganzas in five-star hotels with such extras as ice- cream vans and photo booths.”Schools in England, Wales and Northern Ireland predominantly hold their Prom, or "School Formal", at the end of secondary education in Year 11 (ages 15/16) and the end of Sixth Form (aged 18), for those who have continued school.In Scotland it is usually only held at the end of S6 (ages 17/18) because all high schools in Scotland have pupils up to age 18 years, whereas elsewhere in the UK many students have to go to college to study for A-Levels. Proms are usually held in June, after the end of year exams. At Scottish formal events, boys usually wear kilts (kilts are also often seen in the other Celtic regions) and Highland dress outfitters often sell out in an area around this time of year due to demand from school events. Also in Scotland it is customary for traditional Scottish country dancing (part of the curriculum of all secondary schools) to be included.Related social gatherings elsewhereAfricaIn Egypt, private schools have proms similar to ones held in the United States but with slight differences. The prom is held for a maximum of 3 hours, where teachers attend and enjoy some time with their students. Then there is the "after-prom", where no teachers or parents are allowed, during that time, the real party begins with all the students dancing and enjoying their time. The after prom can continue to 4 am and 5 am.In South Africa, the equivalent of the American prom is the Matric Dance, taking place during the matriculation (i.e., final) year of high school (12th grade). It takes place towards the end of the third quarter, shortly before the spring break, after which the matriculation examinations commence. It usually takes the form of a formal dinner and dance. In most schools, the 11th grade class is responsible for arranging the event. Sometimes teachers and parents also attend.In Kenya, Ethiopia, Nigeria, Uganda, Ghana, and Tanzania most private schools with expatriates have proms or “end of year socials.”In Zambia, private schools have a "leavers' dance/dinner" that is planned out by the grade 11 class and takes place on the Saturday after the Friday of their graduation ceremony. The dance is planned for the grade 12 class as well as the upper sixth form class and is normally done the 1st Friday after both of the classes are done writing their A Level and IGCSE examinations. The dinner begins at 7pm and the grade 11 class pose as the servers as well as the entertainment throughout the duration of the dinner. The dinner ends at midnight and is followed by the "after party" which is celebrated at another venue (usually a club) with no parents and no teachers. Costs for renting out the venue are covered by selling tickets to outsiders and the party is usually planned by the graduating classes themselves.AsiaIn Afghanistan there is a lunch party organized by the graduating students and called "graduation party." This is mostly seen in the university level graduation after the 16th class with a bachelor's degree, this day all the University seniors, faculty members and professors are invited as honors. There is no mingling of males and females due to strict adherence to the Islamic codes.In Hong Kong, prom culture is inherited from the western countries and is generally called ball, such as Christmas Ball. This usually takes place during Christmas and Summer Break. This is more popular in the secondary education stage rather than in universities. Schools, apart from international schools, holding proms are usually single-sex school where normally the Student Unions in the schools will cooperate each other in organizing the event. In recent years, more and more individual unions got united and formed different student unions associations so as to organize large-scale events including large joint-school proms. Except those proms within the academic field, there are also adult proms for charity yearly where celebrities and government officers always go to these functions.In India, Bhutan, Sri Lanka and Nepal, the equivalent to some extent is a farewell party or farewell gathering. The outgoing students are given a warm send-off by the junior students and staff. All the seniors are felicitated with souvenirs and superlatives are given awards. There are also couple dances due to influence of American culture and movies in India.In Israel, high school graduation parties usually combine a play and a humble ceremony, followed by a dance party. In the past years, influenced by American culture, more and more graduates decide to hold a private graduation party similar to the American prom, with dress code, prom dates, limousines, and prom kings or queens, although usually not supported by the school.In Lebanon, proms are held after the graduation ceremony at night. They are usually held at hotels with a formal dress code, prom dates, rented cars and, occasionally, prom kings and queens.In Singapore, proms are held at the near end of a senior year for secondary schools. Proms are normally held after the final examinations of all senior students before graduating.In Malaysia, proms are gaining in popularity, especially in the bigger cities. However, these gatherings are usually organized by students, and the school administration is not involved.In Pakistan, there is a farewell dinner or farewell function that takes place at the end of the college academic year. Particularly in A-Levels people may bring a prom date and students dress in formal attire. Girls are given a corsage by their Prom Dates and the event ends with a photography session with the Graduating batch.In the Philippines, proms are popular in high schools. Prom usually takes place in the junior and senior years of high school, which is normally around February or March. Proms are commonly known as “JS Prom”, or, junior–senior prom. Conversely, if a high school has separate dances for juniors and seniors, the term "prom" is reserved for the juniors, and the dance for the seniors is called a "graduation ball" (often abbreviated as "grad ball" or simply "ball".) The associated student body generally organizes the event. Usually a prom king and queen are chosen. The basis for the king and queen judgment is the beauty and the fashion of the nominee, not the popularity.In Vietnam, the equivalent to the prom is called liên hoan cuối năm. Some schools hold their liên hoan cuối năm at restaurants. But, majority of schools prefer simple "tea parties" with snacks and soft drinks inside their classrooms. In the high schools at rural countrysides, they don't celebrate at all. Unlike other countries, the students don't dress up in fancy dresses or tuxedos. Sometimes, they just simply wear school uniform to the tea parties.EuropeThis section does not cite any sources. Please help improve this section by adding citations to reliable sources. Unsourced material may be challenged and removed. (August 2013) (Learn how and when to remove this template message)AlbaniaIn Albania, "mbrëmja e maturës", as graduation night, is the event held at the end of the senior year. Every school organizes it independently and the event usually takes place in May. Ceremonially it is very similar to prom nights in the United States.Czech RepublicIn the Czech Republic, the last year in Gymnasium is celebrated with maturitní ples (“graduation ball”). This ball takes place before exams are taken, usually in January or February, the traditional season for balls during the Fasching (e.g., List of balls in Vienna). Normally, balls are formal but modern elements are included, too. The students invite their parents, other relatives and friends to come to the ball with them. The balls usually have a theme and the classes perform choreographed dance routines at the beginning or during the evening. The students also receive a ribbon. It's common that various artists are invited to perform at the ball, ranging from fireshow performers to famous celebrities. At the midnight, the classes perform "midnight surprise performance" – typically some sort of funny act. Sometimes several schools organize a joint event. The income is often used to finance a collective voyage of the students after the exams.BulgariaIn Bulgaria, the ball is called abiturientski bal and is held at the end of 12th grade, when you are aged 18/19. Preparations for the ball begin at the end of the 11th grade, because students are supposed to organize the whole event. It is celebrated in May, mainly on the 23rd, 24th or 25th, after finishing exams. Students can bring a date to the event which is usually held in a restaurant or a club. Usually, before the main event there is a big gathering in front of the high school’s building, where graduates count to 12 (as in 12 grades) and take photos with each other before going to the restaurant called izprashtane (“dispatchment”). At the main event in the restaurant/hotel, there is music, usually pop and retro. Students are free to dance with whomever they want, even if they have come with a date. There is usually an afterparty at a dance club. Some people even organize a second afterparty. After the prom night, students usually go to an excursion together for 3 to 5 days. The popular destinations are the Black sea coast and Turkey. The event is often associated with excess in drinking, drugs, sex and lavish nouveau-riche style of dressing and parading (there are families that would spend as much as a year's salary on their son or daughter' s night). The media regularly criticize it, deploring decadence of morals.BeneluxIn Belgium, as well as in some parts of the Netherlands, senior students celebrate their last 100 days of high school with a special day called Chrysostomos or 100-dagen feest (“100-days party”). Tradition states that on this winter day, seniors are allowed to pull pranks on their teachers and fellow students. Some schools handle a theme as dresscode, while others go for the traditional outfit: blue jeans, a black cotton jacket, a black hat (with a red or blue ribbon) and a whistle around the neck. Some even paint their faces and some seniors also carry a spray can (shaving cream or other fluids) to “attack” the non-seniors with. A noisy march through town is also part of the gig. Later during the day, students perform an act at school, usually a silly show involving school or a parody. In the evening, students head to a rented club to party. This involves dancing, singing and lots of beer to get a taste of fraternity life. Sometimes even teachers join the party to show that they too have a wild side. In the Netherlands, households where a child who has passed their high school exams often hang the student's backpack on a flagpole which is attached to the front of the house.Former YugoslaviaIn Bosnia, Croatia, Serbia and the Republic of Macedonia, matursko veče (maturalna večer and maturska večer), as graduation night, is the event held at the end of the senior year. It is similar to prom night in the United States. In Croatia, it is sometimes held in January or February, as in Austria.DenmarkIn Denmark, the prom is called galla and takes place before the exams begin. The word galla refers to the dress code which is long dresses for the women and suits for the men. The prom in Denmark is well known for keeping the traditional dance Les Lanciers, where the third graders of high school (the seniors) start the whole dance, then the 1st and 2nd graders join later on (the high school, called "gymnasium" in Denmark, is three years).EstoniaIn Estonia, the equivalent of the prom is often called Saja päeva ball. The event takes place 100 days prior to the graduation and may be organized with several schools altogether. Students can dance but other events may be involved, too, besides ball room dancing. The clothes are much the same kind as in proms of other countries.FinlandIn Finland, the equivalent of the prom is called vanhojen tanssit (senior ball). The event is held in February when third-year high school students (the abi) end regular classes in order to prepare for their final abitur exams, and the second year students become the oldest in the school. For the remainder of the school year, the second year students are called vanhat ("the old", or " the seniors"). For the ball, the students learn 10–15 formal dances, mostly old ballroom dances such as the mazurkaor a polonaise. In the past, the style was to dress in an old-fashioned way, but these days the attire is similar to U.S. proms.FranceCouple of students in ParisIn France, high school students have only recently experienced prom. On June 27, 2013, more than 300 students in Paris, France held a prom. Event planning company White-Tie-Affair partnered up with multiple local companies to host the “Solidarity Prom Ball” charity gala. Food, drinks, venue, limousine as well as gift bags were sponsored by the different companies and provided for the students for free. On top of that, famous French music groups Psy4 de la Rime and Alibi Montana were the guest performance of the evening. All proceeds from the students’ entrance fee were donated to Donnons Leur Une Chance, a French non-profit organization that will help realize educational projects.GermanyIn Germany (and Austria), students celebrate their graduation from high school, or Gymnasium, with an Abifeier (from the graduation certificate or Abitur) or Maturaball (in Austria the graduation exam is called Matura). In Germany the events are informal and usually contain a series of student-organized activities that tend to make fun of teachers, sometimes with an extended hagiography about the favorite teacher. In Austria the Maturaball is formal and can be seen as a synergy of proms and cotillions and often are highlights of the regional ball season (between November and the end of Carneval) referencing the glamour of the great ball tradition of the former Austrian-Hungarian monarchy. More like the prom is the German Abiball, that follows the official graduation ceremony. Here the students usually wear suits and ball gowns. The Abiball often follows a certain order with a welcome, introductions, an award ceremony for students and sometimes an extended demonstration of all of the artistic outpourings of the students and staff. This is followed by a band (sometimes the school's own band, if there is any) or a DJ playing music, usually starting with a waltz before moving on to other dancing. Alcohol is available at these events since the legal drinking age in Germany is 16 (for beer and wine), and most graduating students are 18 or older.HungaryIn Hungary, students receive a ribbon to mark the beginning of the preparation for their graduation. Students receive this ribbon at a ball called "szalagavató", meaning the "inauguration of ribbons". Many of the students wear this ribbon on their jackets or shirts until graduation. This prom-like evening dance is traditionally held in the ball season of January–February, but November-December has gained popularity in recent years as well. At the beginning of the ball, after a short speech by the headteacher, each student gets the ribbon from their form teacher who pins it on their jacket or dress. Then a series of choreographed dances begins, which the students learned during the months leading up to the event. The first one is traditionally a dance called "palotás" (palace dance) performed by students from different classes, then each graduating class performs their own class dance, and finally there's a waltz, which is also performed by students from different classes. Occasionally, the teachers of the school perform a dance as well. After the ball of the evening organised by the school, students usually go out at night to drink to bars and discos, even if some of them are below drinking age (18 in Hungary).After they graduate, each class has its own party (without choreographed dances) usually at a restaurant, where their teachers are also invited. This is called "érettségi bankett" (graduation banquet).IrelandIn Ireland, this formal dance is called the débutantes' ball. This is referred to as the "grad", or, informally, debs in Ireland. This is a formal dance for students who have just graduated from secondary school (high school) and is traditionally held between September and October. Alcohol is available at these events.ItalyIn Italy the equivalent is known as "i cento giorni" (the one hundred days), an unofficial party organised by students themselves in a location of their choice 100 days before the final exams before high school graduation. Usually the party is not held with all graduating students, rather every class organizes a separated party to celebrate with classmates. The tradition of "i cento giorni" comes from Piedmontese military schools in the late 1800, where days remaining to graduation were counted starting from the 100th with the locution "Mak Π 100", from Piedmontese language "mac pì 100", translating as "just more 100 (days remaining)."LithuaniaIn Lithuania, the prom is held after final exams, usually the same day when high school diplomas are presented. The event is called išleistuvės.NorwayIn Norway, this event varies from school to school. It is usually held during the winter months, and is often called "Nyttårsball" which means "the new years ball." The students are not allowed to bring people from outside the school. In Norway it is the norm to have proms for 8th, 9th, and 10th graders at Norwegian middleschool and most of the time, there is no division between formal and grad – students can attend in whatever clothing they choose, such as traditional knee-long dresses.PolandIn Poland, the prom (studniówka) is a very popular event held each year throughout the country; the word itself means "of or relating to 100 days". Most schools organise such an event about 100 days before the (matura) exams. The first dance of the prom is the polonaise, a traditional Polish dance. Traditionally, the dress code for the studniówka was a typical school outfit, i.e. a white blouse with a dark skirt or trousers. As opposed to the studniówka, the so-called Grand Ball ("bal maturalny") was held after graduation, formal attire required. Nowadays, as Grand Balls are rare, the studniówka has adopted a formal dress code.PortugalIn Portugal there's no prom tradition. Very rarely proms are held. Usually they happen before the end of the school year, in May or June and are called "Baile de Finalistas" (Finalist's Ball). The students wear formal suits and dresses. It is usually organised by a student association, elected in the beginning of the school year by the students to organise school events.RomaniaIn Romania distinct proms are held each year in high schools and college for both the graduating students as well as the newly enrolled ones. They are called graduation balls and freshmen ("boboci", meaning "hatchlings" in Romanian) balls, respectivelly. They are usually not black tie (informal). The venue is chosen by the teaching staff and can be any place, including the school gym or auditorium, a club, restaurant etc. It is common to charge students an admission tax in order to offset the cost. One or more bands or singers are usually hired to provide entertainment. Often the event is sponsored by local businesses. Access is usually controlled and limited to students of that particular high school or university, but exceptions can be made for relatives and it is not uncommon for students from other institutions to try to crash a particular prom. Freshmen proms usually include a popularity contest of some sort, which designates 3 girls and 3 boys as places I, II and III "most popular" as chosen by student vote; the candidates have to undergo various entertaining challenges, which usually include pair dancing. Generally speaking, freshmen proms are the more popular, with college freshmen proms often being publicized as club events and promoted by radio stations, who take the opportunity to introduce bands and singers. Whereas graduation proms are more subdued and often not a public or even a school-wide event, many graduating classes choosing to restrict attendance just to the actual graduates and their teachers.Belarus, Ukraine and RussiaIn Russia, Belarus and Ukraine proms are called "Vypusknоi vechеr" (Выпускной вечер), which literally means "evening of graduation." They take place from the 18th to the 20th or the 23rd to the 25th of June, after all state exams are completed. Proms are never held on the 21st/22nd because they took place on June 21 in 1941, but on the 22nd all graduates were drafted to fight the German invasion during World War II. First, all graduates receive their attestats (or diplomas). Students with higher marks receive them first. Afterward, the prom continues as a school ball, traditionally with classic dances. Students may choose restaurants, cafes, or ships rather than school grounds to hold the events. Proms may be held in a Discothèque, but it must start with the school waltz. At the conclusion of the prom evening, it is tradition to walk the whole night and watch sunrise in the morning (on a hill, if applicable, in Moscow – Sparrow Hills).SlovakiaIn Slovakia, the closest thing to a prom is Stužková, an occasion when the seniors get together with their parents, partners and teachers to celebrate their upcoming graduation. It takes place in November or December. Each of the students receives a green ribbon with their name on it (thus the name Stužková, the Ribbon Ball). The principal and the class teacher are given big green ribbons as well. Many of the students wear this ribbon on their jackets or shirts until graduation. Stužková typically includes a banquet, skits and songs prepared by students, and, of course, dancing. Men wear formal suits and women formal dresses. One week before Stužková is a ceremony of Pečatenie triednej knihy (Sealing of the Class-register) so that teachers will not give bad marks to students before Stužková. It is connected with some story and recorded by cameraman and then put on a DVD of Stužková. It usually starts at 6 p.m. and ends in the early hours of the next morning (4a.m.).SloveniaIn Slovenia, the equivalent is Maturantski ples. It is held before the final exams between January and May, depending on the region and school. Students can bring dates and/or close family to the ball. It is a custom that each student dances the last dance of the first sequence, a Vienna Walzer, with his mother/her father. There is also a dinner and live music.SpainIn some places in Spain proms are also celebrated as parties after school. This parties are called commonly "fiestas de graduación".SwedenIn Sweden, this kind of event is usually known as Studentbalen. The word "Studentbalen" is a proper noun meaning "The Student Ball," while the word studentbal is a common noun that can refer to any formal dinner and dance at a Swedish university. Studentbalen is usually held during the final weeks before graduating and can be formal.SwitzerlandThe Swiss equivalent of a prom is the bal de printemps.[28]Literally translated, this is a "Spring Ball." At some schools in the German speaking cantons, it is called "Maturaball." This is not always organized by the schools, but sometimes by a student's committee. It takes mostly part before the final exams.TurkeyIn Turkey, the equivalent is called "Graduation Ball." The type of event and the rules applied are created by the student governments and school boards. It is a graduation tradition for seniors.OceaniaIn Australia and New Zealand, the tradition is similar to schools in the United States. However, if the event is not described to the final year, it may be described as a Ball, School Formal, or simply Formal. If the event is in the final year of high school, it is sometimes called a Dinner-dance, Leavers' Dinner or Debutante Ball but is also commonly called a School Formal or "Formal." In Australia some schools may also have a Valedictory Dinner, which is like the formal but has students, parents and teachers instead of students and dates.As the name suggests, attire for the occasion is generally formal. Boys will usually dress in a suit and tie. Girls traditionally wear formal gowns or dresses. In most cases a school formal is held at a local reception centre or ballroom. A multicourse meal is generally provided. After the meal students generally dance to popular music played by a hired DJ or sometimes a band. Many students group together to go to the formal in a limousine. While parents do not attend a formal, teachers may act as chaperones for the formal and security guards are sometimes hired. The use of chaperones is intended to prevent the occurrence of violence and alcohol or drug use. Generally after a formal, one or more after-parties are held.In addition to the high school graduation "formal" that marks the end of Year 12, there is also an event that is sometimes held to celebrate completing the School Certificate at the end of Year 10 (or Year 11 in New Zealand), and always held after receiving Higher School Certificate at the end of Year 12 and includes a dinner and dance. The NSW Government announced the abolition of the School Certificate after 2011, with students in year 10 that year being the final cohort to sit the external examinations and receive the qualification. Subsequent Year 10 "Formals" have been deemed "unnecessary" due to the fact that the majority of Year 10 students now progress to Year 11. In previous years when 25–30% of students left high school in Year 10, the Formal was seen as a celebration for those departing, however Year 10 Formals are still sometimes celebrated in the name of tradition. In year 11, students occasionally organise a "semi-formal" or "social" at the end of the school year, which is a more casual version of a formal. If a school has a sister school the social is typically organised in conjunction with them, as a "social event" for people to mingle and meet new people. The Valedictory Dinner (or Val as it is colloquially called) is an event that only occurs in Year 12. In New Zealand, most state school balls are held in the winter months, between June and August, while in Australia, a "formal" is held at the end of the year to mark the end of schooling, as is the Valedictory Dinner. Due to cultural differences, in New Zealand these 'balls' may be held consistently each year with the appropriate respect, but except for private schools they tend to be far less formal and 'proper' than in the US or Australia.In American Samoa the typical Junior/Senior prom is held in most of the schools, an exception would be one of the private schools, which lets even 8th graders, freshmen, and sophomores participate in prom.Central and South America and the CaribbeanIn Venezuela, they have prom as well, they call it "graduación" o "fiesta de graduación." It can consist of dancing, dinner and live music.In Argentina there are "fiestas de egresados" for students finishing their last year of high school. These consist of big parties hosted by the senior students in local discos or other venues, starting at 10 p.m. until about 5 or 6 in the morning. They have dinner with parents and other members of the family, and after midnight friends and other guests join the dance. The parties start in late September, after most students come back from their senior trip to Bariloche and last until early December, after the graduation. The students dress formally.In Brazil, bailes de formatura are usual at the end of high school and at college graduation. There is no crowning of a "king" or a "queen," but evening gowns and suits are required. Family may or may not be included, and there may be a live band or DJ hired to command the music.In Chile, proms, or "fiestas de graduación" (graduation parties), are usually held at convention centers or hotels after the "licenciatura," or graduation from High School. They can also be held after taking the PSU (Chilean University Entrance Exam) in December. Students are expected to dress formally. They are allowed to go with dates or friends. After the dinner,the dance continues through the night into the next day.In Colombia many private schools usually have prom balls as well, usually consisting of a dinner, dancing, live music, and contests. They are usually held at hotels or clubs.In Costa Rica, like many other American countries, the "Baile de graduación" is celebrated after finishing High School, where grade 11 is also the last year. It usually takes place before graduation to celebrate the end of school. It's normally held in hotels or saloons with a dance floor, music and dinner. It starts with the students walking through the dance floor and dancing a waltz. The dinner comes after, and the rest of the night consists of dancing and celebration.In Honduras, they are called "Cena de Graduacion", they are held in luxury hotels, also familiars of the graduating students are invited. This event is held only for private schools, the act consists on a formal graduation and deliver of their diplomas, after that, a dinner is held between the graduating students and their familiars or friends in the same room which later will become in a dance floor for everyone.In Peru, proms—"Fiestas de Promoción"—are usually held at hotels, convention centers, or big residences. The dress code is formal. Some parents and teachers are often invited, but they don't stay the whole night. Dinner is served as well as alcoholic drinks and delicatessen. Breakfast is often served the next day, at around 6–7 am. There is a growing tradition to hold a "Pre-Prom" for the students in the class below the graduating class, and even a "Pre-pre-Prom" for the students in the class below that.In Mexico, most High Schools and Junior High (Middle School) have proms only allow the graduating class (Seniors) to have a prom, after a Church service for the graduating class. The students dress in Formal wear and attend in couples. Some Colleges have an after Graduation dinner dance.In Trinidad and Tobago and most Caribbean countries, it is traditional for schools to hold a dance at the end of the CXC/GCE Advanced Level examination period. This is thrown simultaneously for fifth form and upper sixth form students during the months of June or July after the school's official graduation ceremony. It is colloquially referred to as "grad" or "gradz." Most "gradz" are held in popular clubs, hotels, halls or simply on the school's grounds. Most schools allow students to bring dates, and a formal dress code is usually in effect.In Uruguay, graduation parties are usually held after graduation itself. They may or may be not organised by the school, but by the students itself. Usually a place is rented, and formal parties are held. Students are allowed to take one guest, as a friend or as a partner.Homeschool promsThe concept of extending prom to homeschool students has been realized in recent years. Although some school districts in the United States and Canada allow homeschool students to attend the prom in the school district where they reside, many homeschool groups also organize their own proms. Some states, such as Oregon, Ohio, Georgia, Tennessee, and Michigan, also host statewide homeschool proms, which any homeschool student in that state is welcome to attend.Proms that are specifically geared toward homeschool students can sometimes be significantly different from traditional high school proms. It is not uncommon for a homeschool student to attend a homeschool prom solo, rather than taking a date. Often the music played is chosen by the parents rather than the students.Adult promsAn adult prom is a social event that is almost perfectly similar to a high school prom in terms of themes and attire, except that some adult proms also serve alcoholic beverages, and therefore most adult proms (at least in the U.S.) require those attending to be at least 21 years of age. The origin of adult prom is unclear, though Drew Barrymore is often credited with inadvertenly inventing the concept in the 1990s, when she stated in an interview on Late Night with Conan O'Brien that she threw a prom party for herself and a few friends who never got to go to prom.In the novel Nobody's Property, character Mallorie Walcott, an event planner, mentions that she helped put her younger daughter Cassandra through college, in part, from the revenue she made from planning adult proms in the 1990s either for people who missed their actual high school proms in the 1970s and 1980s, or simply wanted to re-live their prom night.They have become increasingly common, especially in the United States, and usually are hosted either as fundraisers for charities, or for-profit ventures.A slightly different take on the adult prom is that of the disabilities prom, dedicated to providing a prom experience to disabled adults at no charge to the attendees. These events are most often organized by non-profit organizations focusing on the disabled, or large churches.[30]Other prom-themed eventsSometimes, individuals re-create a prom-themed party either for themselves or a friend who didn't get to attend his or her prom.Drew Barrymore has been known to host "prom parties" on at least two occasions, having once stated in an interview with Conan O'Brien in the late 1990s that she threw one for herself one time because she had always wanted a prom, but didn't get the chance, having not finished high school. In 2007, Barrymore threw a prom-themed birthday party for a close friend who had missed her senior prom.In 2009, friends, family members, and hospital workers in Atlanta, Georgia re-created a prom for then-senior Raven Johnson, who was in a coma at the time of her original senior prom.In 2010, Theatrical producers in New York produced an audience participation theatrical play, set in an actual dance hall, called The Awesome 80s Prom, where attendees were at a prom and got to vote on the king and queen from the cast of characters.Anti-proms and alternative promsAnti-proms can be private, unofficial proms that are privately created, outside the control of the school, usually by people who disagree with their school's prom policies. Some schools also include the "Anti Prom" as an official event called MORP (Prom spelled backwards). MORP has become increasingly popular due to the raised awareness and incredible effort on behalf of Kristina Siegert, Esegent Lemma, and Mary Boyd from Belleville, Ontario who refused to participate in the 2017 Prom at Nicholson Catholic College.Adult proms for gay and lesbian adults who could not attend their proms with a date of the same sex are popular in some cities. A 1980 court decision required public schools to allow same-sex dates in the United States.ControversiesOver the course of history, proms have been the source of many controversies, many of which involve LGBT students.In 2002, gay teenager Marc Hall was prohibited from taking his male date to his high school's dance; Hall sued the school board and won.[35]In 2009, Tyler Frost was suspended for attending his girlfriend's prom, because his Christian high school disallowed dancing.[36] Although the principal at Frost's school signed a paper allowing Frost to attend the prom, he said Frost would be suspended if he went, but Frost did so anyway.In a 2010 Itawamba County School District prom controversy, lesbian high school senior Constance McMillen requested to take her girlfriend to the prom at Itawamba Agricultural High School in Fulton, Mississippi, where they were both students. The principal denied her request and prohibited her from wearing a tuxedo. When McMillen challenged the school's policy, the prom was canceled, leading McMillen to sue the school.[37] Following a court decision forcing the school to hold the prom, local parents organized a second prom in secret, leaving Constance, her girlfriend and only 5 other students at the official prom.[38]In 2014, student Katie Bialy from Holy Cross Catholic Secondary School (St. Catharines) with the genetic condition Ehlers-Danlos Syndrome (EDS) was not allowed to go to prom by her school principal Denice Robertson because her grades were not as good as required and she could not graduate.[39] Her condition had impaired her ability to do schoolwork and she asked the principal if she could go as a guest, but the principal refused her the option. This incident has resulted in public support for Bialy in social media and also increased awareness of her condition.In popular cultureIn MoviesThis section may be in need of reorganization to comply with Wikipedia's layout guidelines. Please help by editing the article to make improvements to the overall structure. (April 2016) (Learn how and when to remove this template message)YearTitle1948A Date with Judy1976Carrie1979Going Steady1980Prom Night1983Valley Girl1984Footloose1985Back to the Future1986Pretty in Pink1987Crazy Love1988Dance 'til Dawn1990Book of Love1993My Boyfriend's Back199910 Things I Hate About YouAmerican PieDrive Me CrazyJawbreakerNever Been KissedShe's All That2002Carrie2004Mean Girls2008Bart Got a RoomProm NightTwilightProm Wars2009Miss MarchCabin Fever 2: Spring Fever2011PromTeen Spirit2013CarrieOn Documentary filmsThis section may be in need of reorganization to comply with Wikipedia's layout guidelines. Please help by editing the article to make improvements to the overall structure. (April 2016) (Learn how and when to remove this template message)YearTitle2006The World's Best Prom2008American Teen2009Prom Night in MississippiOn TVThis section may be in need of reorganization to comply with Wikipedia's layout guidelines. Please help by editing the article to make improvements to the overall structure. (April 2016) (Learn how and when to remove this template message)YearEpisodeTV series1990The PromSaved by the Bell1993A Night to RememberBeverly Hills, 90210Promises PromisesRoseanne1995Angels on the AirTouched by an Angel1996The One with the Prom VideoFriends1997The ProphecyBuffy the Vampire Slayer1998Fools Rush Out in Party of FiveParty of FiveProm-ises, Prom-isesBoy Meets World1999The PromBuffy the Vampire SlayerProm NightThat '70s Show2001PromicideDawson's CreekHeart of MineRoswell2006Best Prom EverHow I Met Your MotherThe Party FavorThe O.C.Look Who's StalkingVeronica Mars2007Prom Night at Hater HighOne Tree Hill2008We Built This CityDegrassi: The Next GenerationI've Had the Time of My LifeKyle XY2009Valley GirlsGossip Girl2010The Prom Before the Storm90210Prom WreckerVictorious2011Prom QueenGlee2015Last DancePretty Little Liars2017MTV TV SeriesPromposalMusicThis section may be in need of reorganization to comply with Wikipedia's layout guidelines. Please help by editing the article to make improvements to the overall structure. (April 2016) (Learn how and when to remove this template message)YearSongArtist1958A Date With JerryWanda Jackson1990Promnight in PigtownJohn Gorka2000Teenage DirtbagWheatus2008A Night to RememberHigh School Musical 3: Senior Year2009Plain JaneB.J. ThomasSee alsoFurther readingReferencesCategories

What is the story behind the Trojan Horse?

1971The Creeper system, an experimental self-replicating program, is written by Bob Thomas at BBN Technologies to test John von Neumann's theory. Creeper infected DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message "I'm the creeper, catch me if you can!" was displayed. The Reaper program was later created to delete Creeper.1973In fiction, the 1973 Michael Crichton movie Westworld made an early mention of the concept of a computer virus, being a central plot theme that causes androids to run amok. Alan Oppenheimer's character summarizes the problem by stating that "...there's a clear pattern here which suggests an analogy to an infectious disease process, spreading from one...area to the next." To which the replies are stated: "Perhaps there are superficial similarities to disease" and, "I must confess I find it difficult to believe in a disease of machinery." (Crichton's earlier work, the 1969 novel The Andromeda Strain and 1971 film were about an extraterrestrial biological virus-like disease that threatened the human race.)1974The Rabbit (or Wabbit) virus, more a fork bomb than a virus, is written. The Rabbit virus makes multiple copies of itself on a single computer (and was named "Rabbit" for the speed at which it did so) until it clogs the system, reducing system performance, before finally reaching a threshold and crashing the computer.1975April: ANIMAL is written by John Walker for the UNIVAC 1108. ANIMAL asked a number of questions of the user in an attempt to guess the type of animal that the user was thinking of, while the related program PERVADE would create a copy of itself and ANIMAL in every directory to which the current user had access. It spread across the multi-user UNIVACs when users with overlapping permissions discovered the game, and to other computers when tapes were shared. The program was carefully written to avoid damage to existing file or directory structures, and not to copy itself if permissions did not exist or if damage could result. Its spread was therefore halted by an OS upgrade which changed the format of the file status tables that PERVADE used for safe copying. Though non-malicious, "Pervading Animal" represents the first Trojan "in the wild".The novel The Shockwave Rider by John Brunner is published, coining the word "worm" to describe a program that propagates itself through a computer network.1981–19891981A program called Elk Cloner, written for Apple II systems, was created by Richard Skrenta. The Apple II was seen[by whom?] as particularly vulnerable due to the storage of its operating system[clarification needed] on floppy disk. Elk Cloner's design combined with public ignorance[not in citation given] about what malware was and how to protect against it led to Elk Cloner being responsible for the first large-scale[not in citation given] computer virus outbreak in history.1983November: The term 'virus' is coined by Frederick Cohen in describing self-replicating computer programs. In 1984 Cohen uses the phrase "computer virus" – as suggested by his teacher Leonard Adleman – to describe the operation of such programs in terms of "infection". He defines a 'virus' as "a program that can 'infect' other programs by modifying them to include a possibly evolved copy of itself." Cohen demonstrates a virus-like program on a VAX11/750 system at Lehigh University. The program could install itself in, or infect, other system objects.1984August: Ken Thompson publishes his seminal paper, Reflections on Trusting Trust, in which he describes how he modified a C compiler so that when used to compile a specific version of the Unix operating system, it inserted a backdoor into the login command, and when used to compile itself, it inserted the backdoor insertion code, even if neither the backdoor nor the backdoor insertion code were present in the source code.1986January: The Brain boot sector virus is released. Brain is considered the first IBM PC compatible virus, and the program responsible for the first IBM PC compatible virus epidemic. The virus is also known as Lahore, Pakistani, Pakistani Brain, and Pakistani flu as it was created in Lahore, Pakistan by 19-year-old Pakistani programmer, Basit Farooq Alvi, and his brother, Amjad Farooq Alvi.December: Ralf Burger presented the Virdem model of programs at a meeting of the underground Chaos Computer Club in Germany. The Virdem model represented the first programs that could replicate themselves via addition of their code to executable DOS files in COM format.1987Appearance of the Vienna virus, which was subsequently neutralized—the first time this had happened on the IBM platform.Appearance of Lehigh virus (discovered at its namesake university), boot sector viruses such as Yale from USA, Stoned from New Zealand, Ping Pong from Italy, and appearance of first self-encrypting file virus, Cascade. Lehigh was stopped on campus before it spread to the wild, and has never been found elsewhere as a result. A subsequent infection of Cascade in the offices of IBM Belgium led to IBM responding with its own antivirus product development. Prior to this, antivirus solutions developed at IBM were intended for staff use only.October: The Jerusalem virus, part of the (at that time unknown) Suriv family, is detected in the city of Jerusalem. The virus destroys all executable files on infected machines upon every occurrence of Friday the 13th (except Friday 13 November 1987 making its first trigger date May 13, 1988). Jerusalem caused a worldwide epidemic in 1988.November: The SCA virus, a boot sector virus for Amiga computers appear, immediately creating a pandemic virus-writer storm. A short time later, SCA releases another, considerably more destructive virus, the Byte Bandit.December: Christmas Tree EXEC was the first widely disruptive replicating network program, which paralyzed several international computer networks in December 1987. It was written in Rexx on the VM/CMS operating system and originated in what was then West Germany. It re-emerged in 1990.1988March 1: The Ping-Pong virus (also called Boot, Bouncing Ball, Bouncing Dot, Italian, Italian-A or VeraCruz), an MS-DOS boot sector virus, is discovered at the University of Turin in Italy.June: The CyberAIDS and Festering Hate Apple ProDOS viruses spreads from underground pirate BBS systems and starts infecting mainstream networks. Festering Hate was the last iteration of the CyberAIDS series extending back to 1985 and 1986. Unlike the few Apple viruses that had come before which were essentially annoying, but did no damage, the Festering Hate series of viruses was extremely destructive, spreading to all system files it could find on the host computer (hard drive, floppy, and system memory) and then destroying everything when it could no longer find any uninfected files.November 2: The Morris worm, created by Robert Tappan Morris, infects DEC VAX and Sun machines running BSD UNIX that are connected to the Internet, and becomes the first worm to spread extensively "in the wild", and one of the first well-known programs exploiting buffer overrun vulnerabilities.1989October: Ghostball, the first multipartite virus, is discovered by Friðrik Skúlason. It infects both executable .COM-files and boot sectors on MS-DOS systems.December: Several thousand floppy disks containing the AIDS Trojan, the first known ransomware, are mailed to subscribers of PC Business World magazine and a WHO AIDS conference mailing list. This DOS Trojan lies dormant for 90 boot cycles, then encrypts all filenames on the system, displaying a notice asking for $189 to be sent to a post office box in Panama in order to receive a decryption program.1990–19991990Mark Washburn, working on an analysis of the Vienna and Cascade viruses with Ralf Burger, develops the first family of polymorphic viruses, the Chameleon family. Chameleon series debuted with the release of 1260.June: The Form computer virus is isolated in Switzerland. It would remain in the wild for almost 20 years and reappear afterwards; during the 1990s it tended to be the most common virus in the wild with 20 to more than 50 per cent of reported infections.1992March: The Michelangelo virus was expected to create a digital apocalypse on March 6, with millions of computers having their information wiped, according to mass media hysteria surrounding the virus. Later assessments of the damage showed the aftermath to be minimal. John McAfee had been quoted by the media as saying that 5 million computers would be affected. He later said that, pressed by the interviewer to come up with a number, he had estimated a range from 5 thousand to 5 million, but the media naturally went with just the higher number.1993"Leandro" or "Leandro & Kelly" and "Freddy Krueger" spread quickly due to popularity of BBS and shareware distribution.1994April: OneHalf is a DOS-based polymorphic computer virus.1995The first Macro virus, called "Concept", is created. It attacked Microsoft Word documents.1996"Ply" — DOS 16-bit based complicated polymorphic virus appeared with built-in permutation engine.Boza, the first virus designed specifically for Windows 95 files arrives.Laroux, the first Excel macro virus appears.Staog, the first Linux virus attacks Linux machines1998June 2: The first version of the CIH virus appears. It is the first known virus able to erase flash ROM BIOS content.1999January 20: The Happy99 worm first appeared. It invisibly attaches itself to emails, displays fireworks to hide the changes being made, and wishes the user a happy New Year. It modifies system files related to Outlook Express and Internet Explorer (IE) on Windows 95 and Windows 98.March 26: The Melissa worm was released, targeting Microsoft Word and Outlook-based systems, and creating considerable network traffic.June 6: The ExploreZip worm, which destroys Microsoft Office documents, was first detected.December 30: The Kak worm is a JavaScript computer worm that spread itself by exploiting a bug in Outlook Express.2000–20092000May 5: The ILOVEYOU worm, also known as Love Letter, or VBS, or Love Bug worm, is a computer worm purportedly created by a Filipino computer science student. Written in VBScript, it infected millions of Windows computers worldwide within a few hours of its release. Using social engineering techniques, it is considered to be one of the most damaging worms ever.June 28: The Pikachu virus is believed to be the first computer virus geared at children. It contains the character "Pikachu" from the Pokémon series, and is in the form of an e-mail titled "Pikachu Pokemon" with the message: "Pikachu is your friend." The attachment to the email has "an image of a pensive Pikachu", along with a message stating, "Between millions of people around the world I found you. Don’t forget to remember this day every time MY FRIEND." Along with the image, there is a program, written in Visual Basic 6, called "pikachupokemon.exe" that modifies the AUTOEXEC.BAT file and adds a command for removing the contents of directories C:\Windows and C:\Windows\System at computer's restart. However, a message would appear during startup, asking the user if they would like to delete the contents of those folders. This is because the author, instead of writing the lines “del C:\WINDOWS\*.* /y” and “del C:\WINDOWS\SYSTEM\*.* /y” to AUTOEXEC.BAT, the author did not include the /y switches, which would have automatically chosen the yes option. The operating systems affected by this worm are Windows 95, Windows 98, and Windows ME.2001February 11: The Anna Kournikova virus hits e-mail servers hard by sending e-mail to contacts in the Microsoft Outlook addressbook. Its creator, Jan de Wit, was sentenced to 150 hours of community service.May 8: The Sadmind worm spreads by exploiting holes in both Sun Solaris and Microsoft IIS.July: The Sircam worm is released, spreading through Microsoft systems via e-mail and unprotected network shares.July 13: The Code Red worm attacking the Index Server ISAPI Extension in Microsoft Internet Information Services is released.August 4: A complete re-write of the Code Red worm, Code Red II begins aggressively spreading onto Microsoft systems, primarily in China.September 18: The Nimda worm is discovered and spreads through a variety of means including vulnerabilities in Microsoft Windows and backdoors left by Code Red II and Sadmind worm.October 26: The Klez worm is first identified. It exploits a vulnerability in Microsoft Internet Explorer and Microsoft Outlook and Outlook Express.2002February 11: The Simile virus is a metamorphic computer virus written in assembly.Beast is a Windows-based backdoor Trojan horse, more commonly known as a RAT (Remote Administration Tool). It is capable of infecting almost all versions of Windows. Written in Delphi and released first by its author Tataye in 2002, its most current version was released October 3, 2004March 7: Mylife is a computer worm that spread itself by sending malicious emails to all the contacts in Microsoft Outlook.2003January 24: The SQL Slammer worm, aka Sapphire worm, Helkern and other names, attacks vulnerabilities in Microsoft SQL Server and MSDE becomes the fastest spreading worm of all time (measured by doubling time at the peak rate of growth), causing massive Internet access disruptions worldwide just fifteen minutes after infecting its first victim.April 2: Graybird is a trojan horse also known as Backdoor.Graybird.[28]June 13: ProRat is a Turkish-made Microsoft Windows based backdoor trojan horse, more commonly known as a RAT (Remote Administration Tool).August 12: The Blaster worm, aka the Lovesan worm, rapidly spreads by exploiting a vulnerability in system services present on Windows computers.August 18: The Welchia (Nachi) worm is discovered. The worm tries to remove the blaster worm and patch Windows.August 19: The Sobig worm (technically the Sobig.F worm) spreads rapidly through Microsoft systems via mail and network shares.September 18: Swen is a computer worm written in C++.October 24: The Sober worm is first seen on Microsoft systems and maintains its presence until 2005 with many new variants. The simultaneous attacks on network weakpoints by the Blaster and Sobig worms cause massive damage.November 10: Agobot is a computer worm that can spread itself by exploiting vulnerabilities on Microsoft Windows. Some of the vulnerabilities are MS03-026 and MS05-039.November 20: Bolgimo is a computer worm that spread itself by exploiting a buffer overflow vulnerability at Microsoft Windows DCOM RPC Interface.2004January 18: Bagle is a mass-mailing worm affecting all versions of Microsoft Windows. There were 2 variants of Bagle worm, Bagle.A and Bagle.B. Bagle.B was discovered on February 17, 2004.Late January: The MyDoom worm emerges, and currently holds the record for the fastest-spreading mass mailer worm. The worm was most notable for performing a distributed denial-of-service (DDoS) attack on Xinuos | Home, which belonged to The SCO Group.February 16: The Netsky worm is discovered. The worm spreads by email and by copying itself to folders on the local hard drive as well as on mapped network drives if available. Many variants of the Netsky worm appeared.March 19: The Witty worm is a record-breaking worm in many regards. It exploited holes in several Internet Security Systems (ISS) products. It was the fastest disclosure to worm, it was the first internet worm to carry a destructive payload and it spread rapidly using a pre-populated list of ground-zero hosts.May 1: The Sasser worm emerges by exploiting a vulnerability in the Microsoft Windows LSASS service and causes problems in networks, while removing MyDoom and Bagle variants, even interrupting business.June 15: Caribe or Cabir is a computer worm that is designed to infect mobile phones that run Symbian OS. It is the first computer worm that can infect mobile phones. It spread itself through Bluetooth. More information can be found on F-Secure[33] and Symantec.August 16: Nuclear RAT (short for Nuclear Remote Administration Tool) is a backdoor trojan that infects Windows NT family systems (Windows 2000, Windows XP, Windows 2003).August 20: Vundo, or the Vundo Trojan (also known as Virtumonde or Virtumondo and sometimes referred to as MS Juan) is a trojan known to cause popups and advertising for rogue antispyware programs, and sporadically other misbehaviour including performance degradation and denial of service with some websites including Google and Facebook.October 12: Bifrost, also known as Bifrose, is a backdoor trojan which can infect Windows 95 through Vista. Bifrost uses the typical server, server builder, and client backdoor program configuration to allow a remote attack.December: Santy, the first known "webworm" is launched. It exploited a vulnerability in phpBB and used Google in order to find new targets. It infected around 40000 sites before Google filtered the search query used by the worm, preventing it from spreading.2005August 2005: ZotobOctober 2005: The copy protection rootkit deliberately and surreptitiously included on music CDs sold by Sony BMG is exposed. The rootkit creates vulnerabilities on affected computers, making them susceptible to infection by worms and viruses.Late 2005: The Zlob Trojan, is a Trojan horse program that masquerades as a required video codec in the form of the Microsoft Windows ActiveX component. It was first detected in late 2005.2006January 20: The Nyxem worm was discovered. It spread by mass-mailing. Its payload, which activates on the third of every month, starting on February 3, attempts to disable security-related and file sharing software, and destroy files of certain types, such as Microsoft Office files.February 16: discovery of the first-ever malware for Mac OS X, a low-threat trojan-horse known as OSX/Leap-A or OSX/Oompa-A, is announced.Late March: Brontok variant N was found in late March. Brontok was a mass-email worm and the origin for the worm was from Indonesia.June: Starbucks is a virus that infects StarOffice and OpenOffice.Late September: Stration or Warezov worm first discovered.2007January 17: Storm Worm identified as a fast spreading email spamming threat to Microsoft systems. It begins gathering infected computers into the Storm botnet. By around June 30 it had infected 1.7 million computers, and it had compromised between 1 and 10 million computers by September.[40] Thought to have originated from Russia, it disguises itself as a news email containing a film about bogus news stories asking you to download the attachment which it claims is a film.July: Zeus is a trojan that targets Microsoft Windows to steal banking information by keystroke logging.2008February 17: Mocmex is a trojan, which was found in a digital photo frame in February 2008. It was the first serious computer virus on a digital photo frame. The virus was traced back to a group in China.March 3: Torpig, also known as Sinowal and Mebroot, is a Trojan horse that affects Windows, turning off anti-virus applications. It allows others to access the computer, modifies data, steals confidential information (such as user passwords and other sensitive data) and installs more malware on the victim's computer.May 6: Rustock.C, a hitherto-rumoured spambot-type malware with advanced rootkit capabilities, was announced to have been detected on Microsoft systems and analyzed, having been in the wild and undetected since October 2007 at the very least.July 6: Bohmini.A is a configurable remote access tool or trojan that exploits security flaws in Adobe Flash 9.0.115 with Internet Explorer 7.0 and Firefox 2.0 under Windows XP SP2.July 31: The Koobface computer worm targets users of Facebook and Myspace. New variants constantly appear.November 21: Computer worm Conficker infects anywhere from 9 to 15 million Microsoft server systems running everything from Windows 2000 to the Windows 7 Beta. The French Navy, UK Ministry of Defence (including Royal Navy warships and submarines), Sheffield Hospital network,[48] German Bundeswehr, and Norwegian Police were all affected. Microsoft sets a bounty of US$250,000 for information leading to the capture of the worm's author(s). Five main variants of the Conficker worm are known and have been dubbed Conficker A, B, C, D and E. They were discovered 21 November 2008, 29 December 2008, 20 February 2009, 4 March 2009 and 7 April 2009, respectively. On December 16, 2008, Microsoft releases KB958644 patching the server service vulnerability responsible for the spread of Conficker.2009July 4: The July 2009 cyber attacks occur and the emergence of the W32.Dozer attack the United States and South Korea.July 15: Symantec discovered Daprosy Worm. Said trojan worm is intended to steal online-game passwords in internet cafes. It could, in fact, intercept all keystrokes and send them to its author which makes it potentially a very dangerous worm to infect B2B (business-to-business) systems.August 24: Source code for MegaPanzer is released by its author under GPLv3. and appears to have been apparently detected in the wild.2010–present2010January: The Waledac botnet sent spam emails. In February 2010, an international group of security researchers and Microsoft took Waledac down.January: The Psyb0t worm is discovered. It is thought to be unique in that it can infect routers and high-speed modems.February 18: Microsoft announced that a BSoD problem on some Windows machines which was triggered by a batch of Patch Tuesday updates was caused by the Alureon Trojan.June 17: Stuxnet, a Windows Trojan, was detected. It is the first worm to attack SCADA systems. There are suggestions that it was designed to target Iranian nuclear facilities. It uses a valid certificate from Realtek.September 9: The virus, called "here you have" or "VBMania", is a simple Trojan horse that arrives in the inbox with the odd-but-suggestive subject line "here you have". The body reads "This is The Document I told you about, you can find it Here" or "This is The Free Download Sex Movies, you can find it Here".September 15: The virus called Kenzero is a virus that spreads online from Peer to peer (P2P) sites taking browsing history.2011SpyEye and Zeus merged code is seen. New variants attack mobile phone banking information.Anti-Spyware 2011, a Trojan horse that attacks Windows 9x, 2000, XP, Vista, and Windows 7, posing as an anti-spyware program. It actually disables security-related process of anti-virus programs, while also blocking access to the Internet, which prevents updates.Summer 2011: The Morto worm attempts to propagate itself to additional computers via the Microsoft Windows Remote Desktop Protocol (RDP). Morto spreads by forcing infected systems to scan for Windows servers allowing RDP login. Once Morto finds an RDP-accessible system, it attempts to log into a domain or local system account named 'Administrator' using a number of common passwords.[65] A detailed overview of how the worm works—along with the password dictionary Morto uses—was done by Imperva.July 13: the ZeroAccess rootkit (also known as Sirefef or max++) was discovered.September 1: Duqu is a worm thought to be related to the Stuxnet worm. The Laboratory of Cryptography and System Security (CrySyS Lab)[67] of the Budapest University of Technology and Economics in Hungary discovered the threat, analysed the malware, and wrote a 60-page report naming the threat Duqu. Duqu gets its name from the prefix "~DQ" it gives to the names of files it creates.2012May: Flame – also known as Flamer, sKyWIper, and Skywiper – a modular computer malware that attacks computers running Microsoft Windows. Used for targeted cyber espionage in Middle Eastern countries. Its discovery was announced on 28 May 2012 by MAHER Center of Iranian National Computer Emergency Response Team (CERT), Kaspersky Lab and CrySyS Lab of the Budapest University of Technology and Economics. CrySyS stated in their report that "sKyWIper is certainly the most sophisticated malware we encountered during our practice; arguably, it is the most complex malware ever found".August 16: Shamoon is a computer virus designed to target computers running Microsoft Windows in the energy sector. Symantec, Kaspersky Lab, and Seculert announced its discovery on August 16, 2012.September 20: NGRBot is a worm that uses the IRC network for file transfer, sending and receiving commands between zombie network machines and the attacker's IRC server, and monitoring and controlling network connectivity and intercept. It employs a user-mode rootkit technique to hide and steal its victim's information. This family of bot is also designed to infect HTML pages with inline frames (iframes), causing redirections, blocking victims from getting updates from security/antimalware products, and killing those services. The bot is designed to connect via a predefined IRC channel and communicate with a remote botnet.2013September: The CryptoLocker Trojan horse is discovered. Cryptolocker encrypts the files on a user's hard drive, then prompts them to pay a ransom to the developer in order to receive the decryption key. In the following months, a number of copycat ransomware Trojans are also discovered.December: The Gameover ZeuS Trojan is discovered. This type of virus steals one's login details on popular Web sites that involve monetary transactions. It works by detecting a login page, then proceeds to inject a malicious code into the page, keystroke logging the computer user's details.December: Linux.Darlloz targets the Internet of things and infects routers, security cameras, set-top boxes by exploiting a PHP vulnerability.2014November: The Regin Trojan horse is discovered. Regin is a dropper that is primarily spread via spoofed Web pages. Once downloaded, Regin quietly downloads extensions of itself, making it difficult to be detected via anti-virus signatures. It is suspected to have been created by the United States and United Kingdom over a period of months or years, as a tool for espionage and mass surveillance.2015The BASHLITE malware is leaked leading to a massive spike in DDoS attacks.Linux.Wifatch is revealed to the general public. It is found to attempt to secure devices from other more malicious malware.2016February: Ransomware Locky with its over 60 derivatives spread throughout Europe and infected several million computers. At the height of the spread over five thousand computers per hour were infected in Germany alone. Although ransomware was not a new thing at the time, insufficient cyber security as well as a lack of standards in IT was responsible for the high number of infections. Unfortunately even up to date antivirus and internet security software was unable to protect systems from early versions of Locky.February: Tiny Banker Trojan (Tinba) makes headlines. Since its discovery, it has been found to have infected more than two dozen major banking institutions in the United States, including TD Bank, Chase, HSBC, Wells Fargo, PNC and Bank of America. Tiny Banker Trojan uses HTTP injection to force the user's computer to believe that it is on the bank's website. This spoof page will look and function just as the real one. The user then enters their information to log on, at which point Tinba can launch the bank webpage's "incorrect login information" re [1] turn, and redirect the user to the real website. This is to trick the user into thinking they had entered the wrong information and proceed as normal, although now Tinba has captured the credentials and sent them to its host.September: Mirai creates headlines by launching some of the most powerful and disruptive DDoS attacks seen to date by infecting the Internet of Things. Mirai ends up being used in the DDoS attack on 20 September 2016 on the Krebs on Security site which reached 620 Gbit/s. Ars Technica also reported a 1 Tbit/s attack on French web host OVH. On 21 October 2016 multiple major DDoS attacks in DNS services of DNS service provider Dyn occurred using Mirai malware installed on a large number of IoT devices, resulting in the inaccessibility of several high-profile websites such as GitHub, Twitter, Reddit, Netflix, Airbnb and many others. The attribution of the attack to the Mirai botnet was originally reported by BackConnect Inc., a security firm.2017May: The WannaCry ransomware attack spreads globally. Exploits revealed in the NSA hacking toolkit leak of late 2016 were used to enable the propagation of the malware. Shortly after the news of the infections broke online, a UK cybersecurity researcher in collaboration with others found and activated a "kill switch" hidden within the ransomware, effectively halting the initial wave of its global propagation. The next day, researchers announced that they had found new variants of the malware without the kill switch.June: The Petya (malware) attack spreads globally affecting Windows systems. Researchers at Symantec reveal that this ransomware uses the EternalBlue exploit, similar to the one used in the WannaCry ransomware attack.September: The Xafecopy Trojan attack 47 countries affecting only Android operating systems. Kaspersky Lab identified it as a malware from the Ubsod family, stealing money through click based WAP billing systems.September: A new variety of RAT Trojan, Kedi RAT (Remote Access Trojan) distributed in a Spear Phishing Campaign. The attack targeted Citrix users. The Trojan was able to evade usual system scanners. Kedi Trojan has all characteristics of a common Remote Access Trojan and it could communicate to its Command and Control center via gmail using common HTML, HTTP protocols.2018??????????

Comments from Our Customers

Easy to use, Signing Toolkit works well, legitimate signing system, wonderful interface, highly recommend

Justin Miller